The next time you have to create a password (Password), with uppercase and lowercase combinations, numbers and symbols, do not think you are safe.
Ο Randy Abrams, ανώτερος αναλυτής security στην Webroot, πραγματοποίησε some simple tests. Count all possible passwords you can create with eight characters, numbers, uppercase and lowercase letters and symbols.
He found that 95 ^ 8 possible combinations can be made (26 uppercase + 26 lowercase + 10 numbers + 33 symbols = 95 characters), which are 6.634.204.312.890.625 codes.
Now suppose someone tries to find your code with a standard brute-force attack. Guess they can try about 31 billion passwords per second. So the code breaking we mentioned above can be done, at most 212,903 seconds, or 3.548 minutes, or about two and a half days.
Now, let's talk about the limitations. Let's say a service you use apehand have an eight-character code.
Abrams reports that there are 70,6 trillion passwords with 8 letters. This saves the brute-force attack 2,277 seconds, or almost 38 minutes.
But what if, at name της ασφάλειας, χρησιμοποιείτε έναν κωδικό οκτώ χαρακτήρων (για να τον θυμάστε) και μια υπηρεσία σας αναγκάζει να χρησιμοποιήσετε μόνο κεφαλαία γράμματα αλλά και σύμβολα. Είναι πιο ασφαλές έτσι; Είναι ένας πιο σύνθετος κωδικός πρόσβασης, ο οποίος δυσκολεύει τον αποκωδικοποιητή; ΟΧΙ ακριβώς.
According to Abrams, you just cut 18,5 percent from the potential password group. So in two days, the attacker will discover your password.
If a service requires you to add a number to this password, you have cut the potential passwords to 41 percent. So the attack will last 34 hours, or a day and a half.
Abrams states that it is much better to choose a longer password:
Each additional character in a password effectively increases the pool of passwords. There are 6,5 million times more word combinations with 16 lowercase characters than there are eight character codes using all four character sets. This means 'toodlesmypoodles' is much harder to crack than 'I81B @ gle'
Of course after all the above you understand the value of using control identity δύο φάσεων (2FA).